Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing the Internet, One HTTP 200 OK at a Time., , , and . ;login:, (2017)Effectiveness of file-based deduplication in digital forensics., , and . Security and Communication Networks, 9 (15): 2876-2885 (2016)TLScompare: Crowdsourcing Rules for HTTPS Everywhere., and . WWW (Companion Volume), page 471-476. ACM, (2016)Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services., , , , and . DBSec, volume 9766 of Lecture Notes in Computer Science, page 331-346. Springer, (2016)Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools., , , , , , and . EuroS&P, page 319-333. IEEE, (2017)NavigaTor: Finding Faster Paths to Anonymity., and . EuroS&P, page 214-226. IEEE, (2016)On Reducing Bottlenecks in Digital Forensics., and . ERCIM News, (2016)No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large., , , and . CoRR, (2015)No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large., , , and . ARES, page 10-20. IEEE Computer Society, (2016)Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS., , , and . ARES, page 33:1-33:6. ACM, (2017)